DRI2 Protocol Spec Draft
Keith Packard
keithp at keithp.com
Wed Sep 10 14:10:29 PDT 2008
On Wed, 2008-09-10 at 14:09 -0400, Kristian Høgsberg wrote:
> Everybody can talk to the DRM and create
> a token, but only if you can pass it to the server over DRI2 protocol,
> can you authenticate.
Oh, so the cookie in the protocol is a client identifier of some kind.
In any case, 32 bits of unique id isn't exactly high security; my
thought was that we should allow the system to use a longer key to avoid
spoofing.
> I'd say the two schemes are pretty much equivalent in complexity and
> in what options we have for narrowing down access per client as you
> suggest. Pros and cons of the two schemes as I see it is that your
> scheme eliminates the DRI2Authenticate request from the protocol, but
> requires a random cookie to be generated, which is a little icky...
> how many bits etc? The old scheme is well established and the extra
> request isn't really a concern - it's async.
The cookie could be per-X server if there wasn't any desire to provide
finer-grained access control.
And, 'how many bits' is precisely the question I'd want to leave to the
system, but certainly more than 32.
> Do we need this? When will the client have a better idea of which
> pipe a window is on than the X server?
Yes, whenever the two screens overlap.
> So for DRI2CopyRegion flags, something like this:
>
> #define DRI2_VSYNC_DONT_CARE 0x0
> #define DRI2_VSYNC_ABSOLUTE 0x1
> #define DRI2_VSYNC_RELATIVE 0x2
> ( #define DRI2_VSYNC_RESERVED 0x3 )
Sounds good to me.
--
keith.packard at intel.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.x.org/archives/xorg/attachments/20080910/0de7f099/attachment.pgp>
More information about the xorg
mailing list